To see the other types of publications on this topic, follow the link: Distributed intrusion detection system.

Dissertations / Theses on the topic 'Distributed intrusion detection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Distributed intrusion detection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Karimi, Ahmad Maroof. "Distributed Machine Learning Based Intrusion Detection System." University of Toledo / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1470401374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karkera, Akhil Narayan. "Design and implementation of a policy-based intrusion detection system generic intrusion detection model for a distributed network /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Techateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.

Full text
Abstract:
This thesis proposes a security solution in key management and Intrusion Detection System (IDS) for wireless sensor networks. It addresses challenges of designing in energy and security requirement. Since wireless communication consumes the most energy in sensor network, transmissions must be used efficiently. We propose Hint Key Distribution (HKD) for key management and Adaptive IDS for distributing activated IDS nodes and cooperative operation of these two protocols. HKD protocol focuses on the challenges of energy, computation and security. It uses a hint message and key chain to consume
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zhe. "A Neural Network Based Distributed Intrusion Detection System on Cloud Platform." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1364835027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Selliah, Sentil. "Mobile agent based attack resistant architecture for distributed intrusion detection system." Morgantown, W. Va. : [West Virginia University Libraries], 2001. http://etd.wvu.edu/templates/showETD.cfm?recnum=2060.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2001.<br>Title from document title page. Document formatted into pages; contains vii, 61 p. : ill. Includes abstract. Includes bibliographical references (p. 50-52).
APA, Harvard, Vancouver, ISO, and other styles
6

Chatprechakul, Nattapron. "Improving performance of distributed network intrusion intrusion detection systems using mobile agents." Thesis, Cranfield University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lavaur, Léo. "Improving intrusion detection in distributed systems with federated learning." Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0423.

Full text
Abstract:
La collaboration entre les différents acteurs de la cybersécurité est essentielle pour lutter contre des attaques de plus en plus nombreuses et sophistiquées. Pourtant, les organisations sont souvent réticentes à partager leurs données, par peur de compromettre leur confidentialité ou leur avantage concurrentiel, et ce même si cela pourrait améliorer leurs modèles de détection d’intrusions. L’apprentissage fédéré est un paradigme récent en apprentissage automatique qui permet à des clients répartis d’entraîner un modèle commun sans partager leurs données. Ces propriétés de collaboration et de
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Zhen. "A lightweight intrusion detection system for the cluster environment." Master's thesis, Mississippi State : Mississippi State University, 2003. http://sun.library.msstate.edu/ETD-db/theses/available/etd-07102003-152642/unrestricted/ZhenLiu%5Fthesis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lydon, Andrew. "Compilation For Intrusion Detection Systems." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088179093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weigert, Stefan. "Community-Based Intrusion Detection." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-217677.

Full text
Abstract:
Today, virtually every company world-wide is connected to the Internet. This wide-spread connectivity has given rise to sophisticated, targeted, Internet-based attacks. For example, between 2012 and 2013 security researchers counted an average of about 74 targeted attacks per day. These attacks are motivated by economical, financial, or political interests and commonly referred to as “Advanced Persistent Threat (APT)” attacks. Unfortunately, many of these attacks are successful and the adversaries manage to steal important data or disrupt vital services. Victims are preferably companies from v
APA, Harvard, Vancouver, ISO, and other styles
11

Zhang, Yichi. "Distributed Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1309783705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sagayam, Arul Thileeban. "LIDS: An Extended LSTM Based Web Intrusion Detection System With Active and Distributed Learning." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103471.

Full text
Abstract:
Intrusion detection systems are an integral part of web application security. As Internet use continues to increase, the demand for fast, accurate intrusion detection systems has grown. Various IDSs like Snort, Zeek, Solarwinds SEM, and Sleuth9, detect malicious intent based on existing patterns of attack. While these systems are widely deployed, there are limitations with their approach, and anomaly-based IDSs that classify baseline behavior and trigger on deviations were developed to address their shortcomings. Existing anomaly-based IDSs have limitations that are typical of any machine lea
APA, Harvard, Vancouver, ISO, and other styles
13

Raju, Madhanmohan. "Group based fault-tolerant physical intrusion detection system using fuzzy based distributed RSSI processing." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1393237072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hauser, Christophe. "A basis for intrusion detection in distributed systems using kernel-level data tainting." Phd thesis, Supélec, 2013. http://tel.archives-ouvertes.fr/tel-01066750.

Full text
Abstract:
Modern organisations rely intensively on information and communicationtechnology infrastructures. Such infrastructures offer a range of servicesfrom simple mail transport agents or blogs to complex e-commerce platforms,banking systems or service hosting, and all of these depend on distributedsystems. The security of these systems, with their increasing complexity, isa challenge. Cloud services are replacing traditional infrastructures byproviding lower cost alternatives for storage and computational power, butat the risk of relying on third party companies. This risk becomesparticularly critic
APA, Harvard, Vancouver, ISO, and other styles
15

Hauser, Christophe. "A basis for instrusion detection in distributed systems using kernel-level data tainting." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/63526/1/Christophe_Hauser_Thesis.pdf.

Full text
Abstract:
This project was a step forward in developing intrusion detection systems in distributed environments such as web services. It investigates a new approach of detection based on so-called "taint-marking" techniques and introduces a theoretical framework along with its implementation in the Linux kernel.
APA, Harvard, Vancouver, ISO, and other styles
16

Kachirski, Oleg. "AN INTERACTIVE DISTRIBUTED SIMULATION FRAMEWORK WITH APPLICATION TO WIRELESS NETWORKS AND INTRUSION DETECTION." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2531.

Full text
Abstract:
In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a
APA, Harvard, Vancouver, ISO, and other styles
17

Andersson, Michael, and Andreas Mickols. "A study of Centralized Network Intrusion Detection System using low end single board computers." Thesis, Högskolan Dalarna, Datateknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:du-25552.

Full text
Abstract:
The use of Intrusion Detection Systems is a normal thing today in bigger companies, butthe solutions that are to be found in market is often too expensive for the smallercompany. Therefore, we saw the need in investigating if there is a more affordablesolution. In this report, we will show that it is possible to use low cost single boardcomputers as part of a bigger centralized Intrusion Detection System. To investigate this,we set up a test system including 2 Raspberry Pi 3 Model B, a cloud server and the use oftwo home networks, one with port mirroring implemented in firmware and the other w
APA, Harvard, Vancouver, ISO, and other styles
18

Schoeman, Adam. "Amber : a aero-interaction honeypot with distributed intelligence." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017938.

Full text
Abstract:
For the greater part, security controls are based on the principle of Decision through Detection (DtD). The exception to this is a honeypot, which analyses interactions between a third party and itself, while occupying a piece of unused information space. As honeypots are not located on productive information resources, any interaction with it can be assumed to be non-productive. This allows the honeypot to make decisions based simply on the presence of data, rather than on the behaviour of the data. But due to limited resources in human capital, honeypots’ uptake in the South African market h
APA, Harvard, Vancouver, ISO, and other styles
19

Aditham, Santosh. "Mitigation of Insider Attacks for Data Security in Distributed Computing Environments." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6639.

Full text
Abstract:
In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such systems. From the customer’s perspective, one of the big risks in adopting big data systems is in trusting the service provider who designs and owns the infrastructure, with data security and privacy. However, big data frameworks typically focus on performance and the opportunity for including enhanced security measures is limited. In this dissertation, the problem of mitigating insider attacks is extensively investigated and several stati
APA, Harvard, Vancouver, ISO, and other styles
20

Garcia, Cordero Carlos [Verfasser], Max [Akademischer Betreuer] Mühlhäuser, René [Akademischer Betreuer] Mayrhofer, and Sascha [Akademischer Betreuer] Hauke. "Improving the Capabilities of Distributed Collaborative Intrusion Detection Systems using Machine Learning / Carlos Garcia Cordero ; Max Mühlhäuser, René Mayrhofer, Sascha Hauke." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1193177936/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Garcia, Cordero Carlos [Verfasser], Max Akademischer Betreuer] Mühlhäuser, René [Akademischer Betreuer] [Mayrhofer, and Sascha [Akademischer Betreuer] Hauke. "Improving the Capabilities of Distributed Collaborative Intrusion Detection Systems using Machine Learning / Carlos Garcia Cordero ; Max Mühlhäuser, René Mayrhofer, Sascha Hauke." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1193177936/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Filho, Stenio Firmino Pereira. "Avaliação de ambientes servidores para agentes móveis." Universidade de São Paulo, 2001. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08022002-173805/.

Full text
Abstract:
Agentes móveis são programas que podem ser disparados de um computador (cliente) e transmitidos através de uma rede de comunicação para uma outra maquina (servidor) com o objetivo de executar tarefas a eles designadas. Esta dissertação apresenta uma avaliação de plataformas de desenvolvimento e servidores para agentes móveis. A tecnologia de agentes móveis tem sido alvo de grandes pesquisas, inclusive nos setores de Segurança da Informação e Comércio Eletrônico. Foram executados testes e com as informações foi feita uma análise comparativa, levando-se em consideração questões como característi
APA, Harvard, Vancouver, ISO, and other styles
23

Azevedo, Renato Preigschadt de. "DETECÇÃO DE ATAQUES DE NEGAÇÃO DE SERVIÇO EM REDES DE COMPUTADORES ATRAVÉS DA TRANSFORMADA WAVELET 2D." Universidade Federal de Santa Maria, 2012. http://repositorio.ufsm.br/handle/1/5395.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior<br>The analysis of network traffic is a key area for the management of fault-tolerant systems, since anomalies in network traffic can affect the availability and quality of service (QoS). Intrusion detection systems in computer networks are used to analyze network traffic in order to detect attacks and anomalies. The analysis based on anomalies allows attacks detection by analyzing the behavior of the traffic network. This work proposes an intrusion detection tool to quickly and effectively detect anomalies in computer networks genera
APA, Harvard, Vancouver, ISO, and other styles
24

Alshamrani, S. S. "Distributed monitoring for intrusion detection in clouds." Thesis, University of Liverpool, 2017. http://livrepository.liverpool.ac.uk/3007454/.

Full text
Abstract:
This thesis is in the field of Computer Science. More precisely, its main research themes are in the applied part of the field Cloud Computing. The main focus in this work is on monitoring of cloud systems in a distributed fashion. This work is a natural continuation of previous studies on discovering the symptoms malicious behaviours in cloud systems. Our line of research is based on efficient discovery of the symptoms of threats. This challenge is met through the design and analysis of new algorithms carrying out this job. Several algorithms are studied. First, a simplified version of previo
APA, Harvard, Vancouver, ISO, and other styles
25

Sainani, Varsha. "Hybrid Layered Intrusion Detection System." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/44.

Full text
Abstract:
The increasing number of network security related incidents has made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). Detecting intrusion in a distributed network from outside network segment as well as from inside is a difficult problem. IDSs are expected to analyze a large volume of data while not placing a significant added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel hybrid layered multiagent-based intru
APA, Harvard, Vancouver, ISO, and other styles
26

Maharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.

Full text
Abstract:
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2012 / Town and Country Resort & Convention Center, San Diego, California<br>Telemetry systems are migrating from links to networks. Security solutions that simply encrypt radio links no longer protect the network of Test Articles or the networks that support them. The use of network telemetry is dramatically expanding and new risks and vulnerabilities are challenging issues for telemetry networks. Most of these vulnerabilities are silent in nature and c
APA, Harvard, Vancouver, ISO, and other styles
27

Sonbul, O., M. Byamukama, S. Alzebda, and A. N. Kalashnikov. "Autonomous intrusion detection information system." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28777.

Full text
Abstract:
Abstract – Implementation of security arrangements for insecure premises, for example, for temporary exhibitions or infrequent public events, usually results in substantial security personnel costs which can be potentially reduced by employing an easily installable ad hoc intrusion detection information system. In the paper we described the architecture, design and experimental results for a fully prototyped information system that utilizes ultrasonic sensors operating in the pulse echo mode for the perimeter control and ZigBee transceivers for wireless networking. The system consists of inexp
APA, Harvard, Vancouver, ISO, and other styles
28

Ademi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.

Full text
Abstract:
Web applications are growing rapidly and as the amount of web sites globallyincreases so do security threats. Complex applications often interact with thirdparty services and databases to fetch information and often interactions requireuser input. Intruders are targeting web applications specifically and they are ahuge security threat to organizations and a way to combat this is to haveintrusion detection systems. Most common web attack methods are wellresearched and documented however due to time constraints developers oftenwrite applications fast and may not implement the best security pract
APA, Harvard, Vancouver, ISO, and other styles
29

Morais, Anderson. "Distributed and cooperative intrusion detection in wireless mesh networks." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00789724.

Full text
Abstract:
Wireless Mesh Network (WMN) is an emerging technology that is gaining importance among traditional wireless communication systems. However, WMNs are particularly vulnerable to external and insider attacks due to their inherent attributes such as open communication medium and decentralized architecture. In this research, we propose a complete distributed and cooperative intrusion detection system for efficient and effective detection of WMN attacks in real-time. Our intrusion detection mechanism is based on reliable exchange of network events and active cooperation between the participating nod
APA, Harvard, Vancouver, ISO, and other styles
30

Satam, Shalaka Chittaranjan, and Shalaka Chittaranjan Satam. "Bluetooth Anomaly Based Intrusion Detection System." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/625890.

Full text
Abstract:
Bluetooth is a wireless technology that is used to communicate over personal area networks (PAN). With the advent of Internet of Things (IOT), Bluetooth is the technology of choice for small and short range communication networks. For instance, most of the modern cars have the capability to connect to mobile devices using Bluetooth. This ubiquitous presence of Bluetooth makes it important that it is secure and its data is protected. Previous work has shown that Bluetooth is vulnerable to attacks like the man in the middle attack, Denial of Service (DoS) attack, etc. Moreover, all Bluetooth dev
APA, Harvard, Vancouver, ISO, and other styles
31

Prasad, Praveen. "A dynamically reconfigurable intrusion detection system." NCSU, 2003. http://www.lib.ncsu.edu/theses/available/etd-05202003-181843/.

Full text
Abstract:
This dissertation implements a Network Based Intrusion Detection System on a Dynamically Reconfigurable Architecture. The design is captured using synthesizable Verilog HDL. The Dynamically Reconfigurable Intrusion Detection System (DRIDS) addresses the challenges faced by typical applications that use Reconfigurable devices that do not exploit their full computational density because of the limited FPGA memory, inefficient FPGA utilization, processor to FPGA communication bottlenecks and high reconfiguration latencies. The implementation of Intrusion Detection on the DRIDS boasts of high comp
APA, Harvard, Vancouver, ISO, and other styles
32

Song, Jingping. "Feature selection for intrusion detection system." Thesis, Aberystwyth University, 2016. http://hdl.handle.net/2160/3143de58-208f-405e-ab18-abcecfc8f33b.

Full text
Abstract:
Intrusion detection is an important task for network operators in today?s Internet. Traditional network intrusion detection systems rely on either specialized signatures of previously seen attacks, or on labeled traffic datasets that are expensive and difficult to reproduce for user-profiling to hunt out network attacks. Machine learning methods could be used in this area since they could get knowledge from signatures or as normal-operation profiles. However, there is usually a large volume of data in intrusion detection systems, for both features and instances. Feature selection can be used t
APA, Harvard, Vancouver, ISO, and other styles
33

Barrios, Rita M. "An Adaptive Database Intrusion Detection System." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/86.

Full text
Abstract:
Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent findings suggest that many have attempted to address this concern with the utilization of various detection methodologies in the areas of database authorization, security policy management and behavior analysis but have not been able to find an adequate
APA, Harvard, Vancouver, ISO, and other styles
34

Moyers, Benjamin. "Multi-Vector Portable Intrusion Detection System." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34265.

Full text
Abstract:
This research describes an intrusion detection system designed to fulfill the need for increased mobile device security. The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drainage. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous IC drain by correlating the detected anomalies with wireless attack traffic from both the Wi-Fi and Bluetooth mediums. To
APA, Harvard, Vancouver, ISO, and other styles
35

Gade, Vaibhav. "Intrusion Detection System as a Service : Providing intrusion detection system on a subscription basis for cloud deployment." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Gandre, Amit Prafullachandra. "Implementation of a policy-based intrusion detection system--Generic Intrusion Detection Model (GIDEM version 1.1)." [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000317.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.<br>Title from title page of source document. Document formatted into pages; contains vi, 66 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
37

Ozbey, Halil. "A Genetic-based Intelligent Intrusion Detection System." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606636/index.pdf.

Full text
Abstract:
In this study we address the problem of detecting new types of intrusions to computer systems which cannot be handled by widely implemented knowledge-based mechanisms. The solutions offered by behavior-based prototypes either suffer low accuracy and low completeness or require use data eplaining abnormal behavior which actually is not available. Our aim is to develop an algorithm which can produce a satisfactory model of the target system&rsquo<br>s behavior in the absence of negative data. First, we design and develop an intelligent and behavior-based detection mechanism using genetic-based m
APA, Harvard, Vancouver, ISO, and other styles
38

Otto, vor dem gentschen Felde Nils. "Ein föderiertes Intrusion Detection System für Grids." Diss., lmu, 2008. http://nbn-resolving.de/urn:nbn:de:bvb:19-95066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Nguyen, Quang Trung. "Intrusion Detection System for Classifying User Behavior." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-26398.

Full text
Abstract:
Nowaday, we use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Not only for personal use, computers and network of computers become crucial parts of companies, organizations, governments. A lot of important information is stored in computers and transfered across networks and the Internet. Unauthorized users break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems
APA, Harvard, Vancouver, ISO, and other styles
40

Salce, Licia <1973&gt. "Potenzialità e limiti degli Intrusion Detection System." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4792.

Full text
Abstract:
Si effettua un'analisi dell'efficacia delle regole di un Intrusion Detection System per il rilevamento di attacchi informatici rivolti a servizi web. Si studia l'elaborazione di un insieme di regole per scoprire i tentativi di attacchi in condizioni generali e di una strategia applicabile a casi particolari, in cui sia nota la struttura dell'applicazione web. Si esplora inoltre la possibilità di riuscire a rilevare solo gli attacchi andati a buon fine riducendo al minimo i messaggi derivanti da tentativi non riusciti.
APA, Harvard, Vancouver, ISO, and other styles
41

Ingram, Dennis J. "Autonomous agents for distributed intrusion detection in a multi-host environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Prestberg, Lars. "Automatisk sammanställning av mätbara data : Intrusion detection system." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-28254.

Full text
Abstract:
Projektet utförs på IT-säkerhetsbolaget i Skandinavien AB, en del i deras utbud är ett Cyberlarm där delar skall automatiseras för att kunna presentera information till kunder på ett smidigare sätt. Syftet är att kunna erbjuda kunder mer valuta för pengarna vilket samtidigt innebär ett extra säljargument för produkten. Cyberlarmet är förenklat ett Intrusion Detection System som läser av trafik på ett nätverk och larmar operatören om något suspekt sker på nätet. Utifrån databasen som all information sparas i skapas grafer och tabeller som en översikt av nätet, denna information skall skickas ti
APA, Harvard, Vancouver, ISO, and other styles
43

Sohal, Amandeep Kaur. "A taxonomy-based approach to intrusion detection system." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1446428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ang, Kah Kin. "A multilevel secure constrained intrusion detection system prototype." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5026.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure (MLS) environment consisting of a MLS local area network (LAN) and multiple single-level networks. The MYSEA server enforces a mandatory access control policy to ensure that users can only access data for which they are authorized. Intrusion detection systems (IDS) placed on a single-level network can store the alerts in the IDS databases at the same classification level as the network being monitored. As most databases do not support the enforcement of
APA, Harvard, Vancouver, ISO, and other styles
45

Soares, João Pedro dos Santos. "Implementation of a distributed intrusion detection and reaction system." Master's thesis, 2016. http://hdl.handle.net/10316/99196.

Full text
Abstract:
Relatório Final Estágio do Mestrado Engenharia Informática apresentado à Faculdade de Ciências e Tecnologia da Universidade de Coimbra.<br>Security was not always an important aspect in terms of networking and hosts. Nowadays, it is absolutely mandatory. Security measures must make an e ort to evolve at the same rate, or even at a higher rate, than threats, which is proving to be the most di cult of tasks. In this report we will detail the process of the implementation of a real distributed intrusion detection and reaction system, that will be responsible for securing a core set of networ
APA, Harvard, Vancouver, ISO, and other styles
46

Lin, Shun-Chieh, and 林順傑. "A Study of IDML-based Distributed Intrusion Detection System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60772014878383539633.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學系<br>89<br>As the growth of network environment dramatically increases, the network-based applications and services become more important, and a variety of network intrusions have also been developed to intrude these services. As to these intrusions, several issues including how to identify possible intrusion behaviors, how to detect these identified intrusion behaviors, and how to secure the system infrastructure are needed to be considered. In this thesis, for identifying the intrusion behaviors, a new Intrusion Detection Markup Language (IDML) is proposed to describe the
APA, Harvard, Vancouver, ISO, and other styles
47

Barbosa, Mário Dinis da Silva e. "JBriareos: A Secure and Scalable Distributed Intrusion Detection System." Master's thesis, 2020. https://hdl.handle.net/10216/131956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Barbosa, Mário Dinis da Silva e. "JBriareos: A Secure and Scalable Distributed Intrusion Detection System." Dissertação, 2020. https://hdl.handle.net/10216/131956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hsu, Ying-Che, and 徐英哲. "An Adaptive Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/xw7767.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>93<br>This thesis is mainly connected with Distribution Intrusion Detection System – NDIDS, and how to make each CPU Loading of Snort Clients or Snort sensors reach balance. Besides, this thesis is about two adaptive rule assignment algorithms. One is the increased and deleted principle of the Snort sensor rule. Another is the selected principle of the increased and deleted rule. Furthermore, there is synthetic discussing the differences and suitable time between each algorithm. Finally, this thesis aims at the effect differences and experiment results of the environme
APA, Harvard, Vancouver, ISO, and other styles
50

Tseng, Jen-Chih, and 曾仁志. "A Static Rule Assignment Algorithm for Efficient Distributed Intrusion Detection System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28811918020972188152.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>93<br>In this paper, we propose a method to analyze the rule of intrusion. When having the intrusion, each snort sensor detect the intrusion according to its rules and can balance cpu loading between snort sensor. And we use the snort-verion 2.2.0. Snort has almost three thousand rules about intrusion signature. As many rules, and we how to pick rules to each snort sensor. According to the order of snort against packets, and sort with this order, then dispatch rules to snort sensor equally. Of course, each sensor’s ability is different, may cause some sensor are overlo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!